-
Notifications
You must be signed in to change notification settings - Fork 40k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Demo service account to replace kubernetes-ro use cases in demos #7444
Comments
SGTM. I think the eventual right answer for iv is to have a canonical way to mount the cluster CA cert in the pod. |
This looks right to me. It would be nice if mounting the cluster CA could be done in a way that way mostly transparent to the callers. What about embedding the cluster CA in the kubeconfig file (like we do for kubectl) when it's created (see https://github.com/GoogleCloudPlatform/kubernetes/blob/master/cluster/gce/configure-vm.sh#L277)? |
#7101 is in (final?) review, and comments are slowing down. I may have just worn people out, but I'm optimistic the first pass is getting close |
@brendanburns This overlaps a lot with #5921-- I'm working on the |
@brendanburns @erictune I merged Brendan's PR and will update the Docker image and the example accordingly. But I wanted to know if you want to move the |
@pires we'd love to take over the Dockerfile for the example, it will def. make it easier to make changes in the future. |
@brendanburns I'm just worried about the current example not working with any of the Kubernetes releases. 0.18.0 was tagged but removed so I can't test it today as well and update it. Anyway, do you need anything from me to take over the Dockerfile? |
Yeah, we should wait until post 0.18.0 before rebuilding that image. |
@brendandburns I'm still getting errors with 0.18.0.
|
It wasn't clear but it seems one needs to create the secret as per Elasticsearch example. |
Well, I'm gonna need help with this because
/cc @AntonioMeireles |
OK just fixed it both in my Vagrant + CoreOS thing and Hazelcast. Going to open a couple PRs, one for Hazelcast example and another for CoreOS documentation. |
I think this is fixed; canonical examples of upgrading are in contrib/prometheus (workload agnostic proxy method) and in contrib/for-tests/network-tester (go client construction method). |
Problem
Options
Recommendation: Last option. It is a uses an existing, general mechanism (secrets) and keeps all clusters working the same.
Proposal
There are a number of details to sort out once there is general agreement on the general approach.
The text was updated successfully, but these errors were encountered: